HP Z620 HP Remote Graphics Software 5.4.7 - Page 222

Wrapping applications of interest, Administrator alerts, Anticipating user disconnects

Page 222 highlights

Wrapping applications of interest ● Situation-Agents can be launched that supervise only specific applications in a given environment. Tying agents to specific applications is a selective safety net for every user. ● Benefit-Application-specific agents can be implemented as plug-ins or support utilities for a given application. In the future, certain software providers may provide custom interfaces for safe shutdown messages from an agent or the operating system. Custom agents can be independently maintained and tied to specific application releases for greater support flexibility. Independent agent design supports unit testing and decouples environmental dependencies. ● Issue-Users need specific recourse to disarm an agent if they reconnect. Applications may not interact well with a dedicated agent (and only shutdown due to a global shutdown request). Dedicated agents could possibly be compromised. Administrator alerts ● Situation-Instead of shutting down an environment, an agent can be designed to alert an administrator or operator to determine the status of the user before taking action. This watchdog approach can further be defined to exploit redundant network connection support to a remote system to allow user-directed shutdowns to occur. ● Benefit-System agents are not required to take destructive action-they serve only as alarms and monitors for alternative human intervention. ● Issue-May require redundant networking channel. Requires administrator or operator availability to support. Anticipating user disconnects and reconnects ● Situation-Users must first be warned about the consequences of disconnection. Agents that provide protection for a disconnected session may become a nuisance for unsuspecting users if they fail to address protective measures in place for their safety. For example, users must know how much time they have to reconnect before safeguards take action. If a remote agent arms itself for application termination, users should be presented with a large, unmistakable disarming "optout" panel that, upon login and discovery, they can halt any agent actions before termination. Organizations should carefully discuss and publicize safety measures due to potential data loss. ● Issue- Users should not be able to disable or specify their own timeouts due to potential irreversible data loss. General agent design guidelines In developing an agent, HP recommends following these guidelines: ● The agent should externally log its decisions and actions for postmortem analysis. ● Independent agents should provide their own opt-out, disarming dialogs with countdown feedback before taking action. 206 Chapter 10 Remote Application Termination

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247

Wrapping applications of interest
Situation
—Agents can be launched that supervise only specific applications in a given
environment. Tying agents to specific applications is a selective safety net for every user.
Benefit
—Application-specific agents can be implemented as plug-ins or support utilities for a
given application. In the future, certain software providers may provide custom interfaces for safe
shutdown messages from an agent or the operating system. Custom agents can be independently
maintained and tied to specific application releases for greater support flexibility. Independent
agent design supports unit testing and decouples environmental dependencies.
Issue
—Users need specific recourse to disarm an agent if they reconnect. Applications may not
interact well with a dedicated agent (and only shutdown due to a global shutdown request).
Dedicated agents could possibly be compromised.
Administrator alerts
Situation
—Instead of shutting down an environment, an agent can be designed to alert an
administrator or operator to determine the status of the user before taking action. This watchdog
approach can further be defined to exploit redundant network connection support to a remote
system to allow user-directed shutdowns to occur.
Benefit
—System agents are not required to take destructive action—they serve only as alarms
and monitors for alternative human intervention.
Issue
—May require redundant networking channel. Requires administrator or operator
availability to support.
Anticipating user disconnects and reconnects
Situation
—Users must first be warned about the consequences of disconnection. Agents that
provide protection for a disconnected session may become a nuisance for unsuspecting users if
they fail to address protective measures in place for their safety. For example, users must know
how much time they have to reconnect before safeguards take action. If a remote agent arms itself
for application termination, users should be presented with a large, unmistakable disarming "opt-
out" panel that, upon login and discovery, they can halt any agent actions before termination.
Organizations should carefully discuss and publicize safety measures due to potential data loss.
Issue
— Users should not be able to disable or specify their own timeouts due to potential
irreversible data loss.
General agent design guidelines
In developing an agent, HP recommends following these guidelines:
The agent should externally log its decisions and actions for postmortem analysis.
Independent agents should provide their own opt-out, disarming dialogs with countdown feedback
before taking action.
206
Chapter 10
Remote Application Termination